1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
musickatia [10]
3 years ago
6

Discuss the most enormous cases of a data breach in the twenty-first century

Computers and Technology
1 answer:
barxatty [35]3 years ago
7 0

Answer:

Gary McKinnon

Hak Nasa technecly a goverment servers

Explanation:

You might be interested in
Suppose you are implementing the address book feature for a cellphone. The address book needs to be kept sorted by person’s last
NemiM [27]

Answer:

Sorted linked list

Explanation:

  • A sorted linked list can be used for sorting the last name and support fast access while queried by the last name.
  • The hash table cannot be used because it could have a problem if there would be more buckets to handle than the expected.
  • The binary search table is implemented as the hash table hence both will give the same results.
8 0
3 years ago
Format Painter cannot be used to copy only character attributes. True or False
andrey2020 [161]
Format painter are used for copying texts, shape and even pictures. It is located on the top left part of your home button of your microsoft product. The statement " Format painter cannot be used to copy only character attributes." is absolutely False. As it can copy things individually.
4 0
4 years ago
Ancler Corporation wants to calculate how much their profits were in the first quarter of the year. They should use a _____.
Karo-lina-s [1.5K]

Answer: Spreadsheet

Explanation:

Spreadsheet is a computer program that helps in keeping data records in form of rows and columns, storing account data etc. The information  or data is entered in sheets and can be updated, sorted and calculated for accounts, tax calculation, budget calculation, revenue calculation etc.

  • Example of spreadsheet :- Microsoft Excel program.
  • Therefore ,according to question,Ancler Corporation should use spreadsheet for calculation of profit in year's first quarter time

8 0
3 years ago
As a Waterfall project manager, your goal is to minimize any changes that could lead to scope creep. You want to protect your te
Harrizon [31]

The necessary things that should be done to avoid a project scope creep include documenting the project requirements and setting up change control processes.

The scope of a project simply means the work that is required in order to complete a project. On the other hand, project scope creep means the occurrence that happens when changes are made to the scope without a change request.

To avoid project scope creep, it's important to document the project requirements, set up changes in control processes, and have a clear project schedule.

Learn more about projects on:

brainly.com/question/4853153

8 0
3 years ago
A user has multiple web pages open and is using email. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/I
Fudgin [204]

Answer:

This is the second question like this I've seen. They aren't the greatest.

Explanation:

The question is not good. The answer would be option a, Transport even though it doesn't make a whole lot of sense when you really go into detail.

It could also be option d, Application but I think they're going for the first.

6 0
2 years ago
Other questions:
  • Jacob is a website designer. Whenever his company takes on a new project, Jacob takes the initiative and comes up with ideas and
    12·1 answer
  • EASY AND I GIVE BRAINLIEST!!! What is a good jeopardy question about operating systems?
    6·1 answer
  • _____ is an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a compan
    8·1 answer
  • Can you install Ubuntu on a hard drive by porting from the folder to the HDD?
    10·1 answer
  • Write a JAVA program containing a method called hasEight(), which takes an int as input and returns true if the number contains
    14·1 answer
  • What is a rigid layer that surrounds plant cell.
    13·1 answer
  • Authentication is a mechanism whereby unverified entities or supplicants who seek access to a resource provide a label by which
    12·1 answer
  • What is considered an important ethical consideration when working with families
    13·1 answer
  • What is the answer ??​
    11·1 answer
  • Which new development in malware caused sandbox technology to automate and introduce artificial intelligence learning
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!